Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
[ISSForum] ID 17623 IP_tunnel_bad_version
From: Cunningham, Chris, R. (CCunninghamwilmingtontrust.com)
Date: Mon Oct 18 2004 - 14:41:10 CDT
We have been seeing a ton of the above signatures, with no details as to
source or destination, and the Security Details are just as cryptic.
According to ISS, these are a new unpatched vulnerability that has been
reported to the vendor and due to NDAs, no other details are available.
Is anyone else seeing these events or know anything about them?
Chris R. Cunningham, CISSP | Wilmington Trust Information Protection |
302.636.6225 | Security Hotline 302.636.6222
Investment products are not insured by the FDIC or any other governmental agency, are not deposits of or other obligations of or guaranteed by Wilmington Trust or any other bank or entity, and are subject to risks, including a possible loss of the principal amount invested. This e-mail and any files transmitted with it may contain confidential and/or proprietary information. It is intended solely for the use of the individual or entity who is the intended recipient. Unauthorized use of this information is prohibited. If you have received this in error, please contact the sender by replying to this message and delete this material from any system it may be on.
ISSForum mailing list
TO UNSUBSCRIBE OR CHANGE YOUR SUBSCRIPTION, go to https://atla-mm1.iss.net/mailman/listinfo/issforum
To contact the ISSForum Moderator, send email to mod-issforumiss.net
The ISSForum mailing list is hosted and managed by Internet Security Systems, 6303 Barfield Road, Atlanta, Georgia, USA 30328.